All the vulnerabilites related to Barracuda Networks Inc. - Barracuda ESG Appliance
cve-2023-7102
Vulnerability from cvelistv5
Published
2023-12-24 21:47
Modified
2024-08-02 08:50
Severity ?
EPSS score ?
Summary
Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Barracuda Networks Inc. | Barracuda ESG Appliance |
Version: 5.1.3.001 < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:50:08.291Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.barracuda.com/company/legal/esg-vulnerability" }, { "tags": [ "x_transferred" ], "url": "https://www.cve.org/CVERecord?id=CVE-2023-7101" }, { "tags": [ "x_transferred" ], "url": "https://metacpan.org/dist/Spreadsheet-ParseExcel" }, { "tags": [ "x_transferred" ], "url": "https://github.com/haile01/perl_spreadsheet_excel_rce_poc" }, { "tags": [ "x_transferred" ], "url": "https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171" }, { "tags": [ "x_transferred" ], "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Barracuda ESG Appliance", "vendor": "Barracuda Networks Inc.", "versions": [ { "changes": [ { "at": "Patched in all active versions by security update removing the vulnerable logic.", "status": "affected" } ], "lessThanOrEqual": "9.2.1.001", "status": "affected", "version": "5.1.3.001", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Barracuda Networks Inc. - https://www.barracuda.com/" }, { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Barracuda Networks Inc. - https://www.barracuda.com/" }, { "lang": "en", "type": "remediation developer", "user": "00000000-0000-4000-9000-000000000000", "value": "Barracuda Networks Inc. - https://www.barracuda.com/" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.\u003cp\u003eThis issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.\u003c/p\u003e" } ], "value": "Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.\n\n" } ], "impacts": [ { "capecId": "CAPEC-137", "descriptions": [ { "lang": "en", "value": "CAPEC-137: Parameter Injection" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1104", "description": "CWE-1104: Use of Unmaintained Third Party Components", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-26T19:23:33.832Z", "orgId": "027e81ed-0dd4-4685-ab4d-884aec5bb484", "shortName": "Mandiant" }, "references": [ { "url": "https://www.barracuda.com/company/legal/esg-vulnerability" }, { "url": "https://www.cve.org/CVERecord?id=CVE-2023-7101" }, { "url": "https://metacpan.org/dist/Spreadsheet-ParseExcel" }, { "url": "https://github.com/haile01/perl_spreadsheet_excel_rce_poc" }, { "url": "https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171" }, { "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Remote Code Execution (RCE) Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "027e81ed-0dd4-4685-ab4d-884aec5bb484", "assignerShortName": "Mandiant", "cveId": "CVE-2023-7102", "datePublished": "2023-12-24T21:47:20.453Z", "dateReserved": "2023-12-24T17:32:25.423Z", "dateUpdated": "2024-08-02T08:50:08.291Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }